Register for the CourseDownload Catalogue

app_pic.jpg

Interested for CAREER
Development Counselling

Make an Appointment

What they Say?

Well organized thought out presentation, study material, communication. I am satisfied about PMP course and fully appreciated by trainer for their way of representation88.

side_pic.png
innerBanner.jpg

With massive computer and digital penetration across the globe, Digital Forensics Examiner assumes prominence for training on Cyber Crime and Fraud Investigations

Overview

partner01-1.jpg     LockHardDrive.jpg

 

A DIGITAL FORENSICS CAPABILITY IS NEEDED WITHIN ANY ORGANIZATION FOR LEGAL, REGULATORY AND BEST PRACTICE REQUIREMENTS TO PRESERVE EVIDENCE AND ASSURE EVIDENCE IS ADMISSIBLE IN A COURT OF LAW


 

CAMBRIDGE a name that echoes the POWER OF KNOWLEDGE introduces yet another beneficial course to its successful course structure to ensure your organization can defend against and respond to compromises. For this first time, CAMBRIDGE is bringing Digital Forensics education to this part of the world in association with CyberSecurity Institute, USA (The World Leader for Digital Forensics Expertise & trade;). Become an expert by being trained by experts!


This training is meant for those without any previous experience with computer forensics. The student will be introduced to concepts and techniques that every computer forensics practitioner must master. This is the same course that has been delivered to thousands of IT professionals,members of law enforcement, and the military.


ORGANIZATIONS USING AND RELYING ON DIGITAL FORENSICS TECHNOLOGY
  • Banks
  • Credit card companies
  • Corporations
  • Data recovery firms
  • Educational institutions
  • Government agencies
  • Law enforcement
  • Law firms
  • Military

WHY DOES MY COMPANY NEED A DIGITAL FORENSICS CAPABILITY?

  • Audit requirements
  • Ensuring compliance with local laws and regulations
  • Corporate policies and standards compliance

Evidence gathering and analysis for:

  • Employee firing/termination
  • Employee misconduct, disciplinary action
  • Exceptional/extreme cases (death, suicide, kidnapping, etc.)
  • Risk management, risk control
  • Intellectual Property (IP) theft
  • Investigating IT policy violation
  • IT infrastructure abuse/misuse
  • Verifying corporate data sanitation measures

Digital Forensics does not just deal with criminal matters or law enforcement. Situations where the skills of a computer forensics analyst are needed arise everyday - divorces, civil disputes, bankruptcies, medical malpractice, wills, the list goes on and on.


WHO SHOULD TAKE THIS CLASS?

Anyone in an information technology related field. New security personnel, IT security officers, security professionals, security auditors, network engineers, network administrators, troubleshooters and technicians. Appropriate for anyone interested in network security - technical CEOs and law enforcement as well.

 


 

>COURSE TOPICS INCLUDE

  • Active, archival and latent data
  • Hashes and Checksums
  • Conducting keyword searches
  • Creating understandable and accurate reports
  • Creating forensically sound working copies or images of media
  • Common File Header formats
  • Documentation, chain of custody, and evidence handling procedures
  • Assisting with motions (ie, motions to compel production of a hard drive, logs, etc)
  • Questions to prepare for/advising your attorney/lawyer
  • FAT 12/16/32 file systems
  • File slack, ram slack, drive slack, and unallocated space
  • NTFS File Systems
  • Interpretation of various log formats
  • Interpreting Internet History and HTTP concepts
  • Manual and automated data recovery
  • Metadata for Microsoft Office and PDF documents
  • Overcoming encryption mechanisms and password protection
  • Privacy issues
  • Rules of evidence
  • Windows print spool files
  • Windows registry
  • Windows shortcuts
  • Windows swap file
  • Working as an expert technical witness
  • Insurance/liability issues
  • Viruses and malware
  • PREREQUISITES

    It is highly recommended that students have several years experience in information technology and trouble- shooting Windows based systems. Experience as a System Administrator, Network Administrator, PC Repair Technician, etc., is desirable.


    CERTIFICATION

    On the last day of the course, you will be able to test for the Digital Forensic Examiner designation.


    FORENSIC TOOLS

    You will be exposed to a variety of computer forensic tools during your computer forensics training. Understand that we stress methodology and of what the forensic software tools are doing versus using any specific tools. A forensic examiner who has a firm grasp of the basics will be able to use and learn to use a multitude of tools. Once you successfully complete our course, you will be able to use whatever tools you choose and are available to you.


    YOUR DIGITAL FORENSIC EXPERTS AND INSTRUCTORS

    CyberSecurity Institute (CSI) is a world leader for digital forensic expertise. The lead instructors Steve Hailey and Mike Andrew are Information Technology veterans with over forty years of combined experience in information technology and 22 years experience as digital forensic experts. They have performed work and conducted training in the fields of computer networking, information security, and digital forensics for Fortune 100 companies, several law firms, the federal government, various law enforcement agencies, and several colleges. Both are actively involved with developing and delivering training in forensics to members of city, state, and federal law enforcement agencies, and have been training Department of Defense personnel since 2005. Steve and Mike are both instructors and Subject Matter Experts for the Cyber terrorism Defense Initiative program for the Department of Homeland Security and FEMA. They are founding officers of the Washington State High Technology Crime Investigation Association, and have been featured on television and radio.


    Cases that Steve and Mike have worked on range from inappropriate resource use and network intrusions to cases involving identity theft,credit card fraud, child pornography and money laundering. They are both creators of the CyberSecurity Forensic Analyst (CSFA) ™ certification,as well as the authors of several computer computing course books.


    Certifications possessed by Steve & Mike include:

    A+, AccessData Certified Examiner, Certified EC-Council Instructor, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CIW:Certified Trainer, CIW:E-Commerce Designer, CIW:Foundations, CIW:Internetworking Professional, CIW:Security Analyst, CIW:Security Professional, CIW:Server Administrator, CIW:Site Designer, CIW:Master Server Administrator, CIW:Master Site Designer, Certified Personal Digital Assistant Examiner, Certified Technical Trainer, Computer Forensics Certificate: Oregon State University, Digital Forensic Certified Practitioner, Forensic Computer Examiner, iNet+, Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional + Internet, Network+, Security+, Security Certified Network Professional (SCNP), Licensed Private Investigator - Washington State.

     

     

    The PMI Registered Education Provider logo is a registered mark of the Project Management Institute, Inc. 

Our Partners